Common TCP/IP Protocols Flashcards

(32 cards)

1
Q

Protocol

A

A set of standards for communication between network hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protocol suite

A

A group of protocols intended to be used together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name Web services protocols

A
  • Hypertext Transfer Protocol (HTTP)

* HTTP over SSL (HTTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hypertext Transfer Protocol (HTTP)

A
  • Is used by web browsers and web servers o exchange files (such as web pages) through the World Wide Web and intranets.
  • Can be described as an information requesting and responding protocol.
  • Is typically used to request and send web documents, but is also used as the protocol for communication between agents using different TCP/IP protocols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HTTP over SSL (HTTPS)

A

Is a secure form of HTTP that uses SSL to encrypt data before it is transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name Security protocols

A
  • Secure Sockets Layer (SSL)

* Transport Layer Security (TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secure Layer Security (SSL)

A
  • Secures messages being transmitted on the Internet
  • Uses RSA for authentication and encryption
  • Web browsers use SSL to ensure safe web transactions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Transport Layer Security (TLS)

A
  • Ensure the messages being transmitted on the Internet are private and tamper proof.
  • TLS is implemented in two protocols
  • TLS Record provides connection security with encryption (with DES for example)
  • TLS Handshake provides mutual authentication and choice of encryption method
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name the file transfer protocols

A
  • File Transfer Protocol (FTP)
  • Trivial File Transfer Protocol (TFTP)
  • Secure File Transfer Protocol (SFTP)
  • Secure Copy (SCP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

File Transfer Protocol (FTP)

A
  • Generic method of transferring files
  • Protect access to files by requiring usernames and passwords, and allows file transfer between dissimilar computer systems
  • Can transfer both binary and text files including HTML to another host
  • *** FTP does not use encryption. All data are sent over the network in clear text **
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Trivial File Transfer Protocol (TFTP)

A
  • Does not provide user authentication or error detection
  • Used when files need to be transferred between systems quickly
  • Since it does not perform error detection TFTP is faster than FTP but is susceptible to transmission errors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Secure File Transfer Protocol (SFTP)

A
  • Uses SSH to secure data transfer

* SSH ensures that SFTP transmission use encrypted commands and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Secure Copy (SCP)

A
  • Used to securely transfer files between systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name Email Protocols

A
  • Simple Mail Transfer Protocol (SMTP)
  • Post Office Protocol 3 (POP3)
  • Internet Message Access Protocol version4 (IMAP4)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Simple Mail Transfer (SMTP)

A
  • Is used to route electronic mail through the internetwork
  • Is used between mail severs for sending and relaying mail
  • Is used by all email clients to send mail
  • by some email client programs, such as Outlook for receiving mail from an Exchange server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Post Office Protocol 3 (POP3)

A
  • Is used to retrieve email from a remote server and download it to a local client over TCP/IP connection
  • *** An email client that uses POP3 for receiving mail uses SMTP for sending mail **
17
Q

Internet Message Access Protocol version4 (IMAP4)

A
  • Designed to enable users to access their mail for various locations, with out the need to transfer messages or files back and forth between computers
  • Messages remain on the remote mail server and are not automatically downloaded to a client system
  • *** An email client that uses IMAP4 for receiving mail uses SMTP for sending mail **
18
Q

Network Services Protocols

A
  • Dynamic Host Configuration Protocol (DHCP)
  • Domain Name System (DNS)
  • Network Time Protocol (NTP)
  • Lightweight Directory Access Protocol (LDAP)
19
Q

Dynamic Host Configuration Protocol (DHCP)

A
  • Is used to automatically assign addresses and other configuration parameters to network hosts
  • Using a DHCP server, hosts receive configuration information at startup, reducing the amount of manual configuration required on each host
20
Q

Domain Name System (DNS)

A
  • A distributed system throughout the internetwork that provides addresses and name resolution
  • EX www.mydomain.com would be mapped to a specific IP address
21
Q

Network Time Protocol (NTP)

A
  • Used to communicate time synchronization information between systems on a network
22
Q

Lightweight Directory Access Protocol (LDAP)

A
  • Used to search, retrieve data from, and update a directory service
  • This protocol follows a client/server model.
  • One or more LDAP servers contain the directory data
  • The client connects to an LDAP Server to make a directory service request
23
Q

Network Management Protocols

A
  • Simple Network Management Protocol (SNMP)
  • Remote Terminal Emulation (Telnet)
  • Secure Shell (SSL)
24
Q

Simple Network Management Protocol (SNMP)

A
  • Designed for managing complex networks
  • Lets network hosts exchange configuration and status information.
  • This information can be gathered by management software and is used to monitor and manage the network
25
Remote Terminal Emulation (Telnet)
* Allows a computer to remotely access the console of a computer system somewhere else in the network * Was used for remote management task but rarely used today * Does not use encryption - recommended to use a secure alternative to Telnet for remote management task, such as SSH
26
Secure Shell (SSH)
* Allows for secure interactive control of remote systems * Uses RSA public key cryptography for both connection and authentication * Uses the IDEA algorithm for encryption by default, but is can use Blowfish and DES * Is a secure and preferred alternative to Telnet
27
Transport Protocols
* Transmission Control Protocol (TCP) | * User Datagram Protocol (UDP)
28
Transmission Control Protocol (TCP)
* Provides services that ensure accurate and timely delivery of network communication between two hosts * Sequencing of data packets * Flow control * Error checking * Acknowledgement of packets sent * Retransmission of lost packets
29
User Datagram Protocol (UDP)
* Host to host protocol like TCP but * Doesn't acknowledge each packet transmitted * Doesn't allow for retransmission of lost packets * That reduces overhead allowing for faster communications * Ideal of streaming audio and video * Speed come at the expense of possible errors or data loss
30
Control Protocols
* Internet Control Message Protocol (ICMP) | * Internet Group Membership Protocol (IGMP)
31
Internet Control Message Protocol (ICMP)
* Works closely with IP to prevent errors and control information by allowing host to exchange packet status information * Ping and traceroute use ICMP message to check network connectivity * ICMP also works with IP to send notices * When destinations are unreachable * Which route and hops a packets takes through a network * Whether devices can communicate across the network
32
Internet Group Membership Protocol (IGMP)
* Defines host groups * All group members can receive broadcast messages (multicasts) intended for the group * Multicast groups can be composed of devices within the same network or across networks (connected with a router)